Home
last modified time | relevance | path

Searched refs:bytes (Results 1 – 25 of 107) sorted by relevance

12345

/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_cipher.camellia.data9 CAMELLIA Encrypt and decrypt 0 bytes [#1]
17 CAMELLIA Encrypt and decrypt 2 bytes [#1]
21 CAMELLIA Encrypt and decrypt 7 bytes [#1]
25 CAMELLIA Encrypt and decrypt 8 bytes [#1]
29 CAMELLIA Encrypt and decrypt 9 bytes [#1]
33 CAMELLIA Encrypt and decrypt 15 bytes [#1]
37 CAMELLIA Encrypt and decrypt 16 bytes [#1]
41 CAMELLIA Encrypt and decrypt 17 bytes [#1]
45 CAMELLIA Encrypt and decrypt 31 bytes [#1]
49 CAMELLIA Encrypt and decrypt 32 bytes [#1]
[all …]
A Dtest_suite_cipher.des.data13 DES Encrypt and decrypt 0 bytes [#1]
21 DES Encrypt and decrypt 2 bytes
25 DES Encrypt and decrypt 7 bytes
29 DES Encrypt and decrypt 8 bytes
33 DES Encrypt and decrypt 9 bytes
37 DES Encrypt and decrypt 15 bytes
41 DES Encrypt and decrypt 16 bytes
45 DES Encrypt and decrypt 17 bytes
49 DES Encrypt and decrypt 31 bytes
61 DES Encrypt and decrypt 47 bytes
[all …]
A Dtest_suite_bignum_mod_raw.function167 TEST_MEMORY_COMPARE(X, bytes, Y, bytes);
300 TEST_MEMORY_COMPARE(X, bytes, res, bytes);
305 TEST_MEMORY_COMPARE(X, bytes, res, bytes);
310 TEST_MEMORY_COMPARE(X, bytes, res, bytes);
423 TEST_MEMORY_COMPARE(X, bytes, R, bytes);
428 TEST_MEMORY_COMPARE(X, bytes, R, bytes);
433 TEST_MEMORY_COMPARE(X, bytes, R, bytes);
581 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
586 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
591 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
[all …]
A Dtest_suite_cipher.aria.data5 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 0 bytes
13 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 2 bytes
17 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 7 bytes
21 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 8 bytes
25 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 9 bytes
29 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 15 bytes
33 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 16 bytes
37 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 17 bytes
41 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 31 bytes
45 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 32 bytes
[all …]
A Dtest_suite_cipher.null.data1 NULL Encrypt and decrypt 0 bytes
5 NULL Encrypt and decrypt 1 bytes
9 NULL Encrypt and decrypt 2 bytes
13 NULL Encrypt and decrypt 7 bytes
17 NULL Encrypt and decrypt 8 bytes
21 NULL Encrypt and decrypt 9 bytes
25 NULL Encrypt and decrypt 15 bytes
29 NULL Encrypt and decrypt 16 bytes
33 NULL Encrypt and decrypt 31 bytes
37 NULL Encrypt and decrypt 32 bytes
[all …]
A Dtest_suite_cipher.chacha20.data9 ChaCha20 Encrypt and decrypt 0 bytes
13 ChaCha20 Encrypt and decrypt 1 bytes
17 ChaCha20 Encrypt and decrypt 2 bytes
21 ChaCha20 Encrypt and decrypt 7 bytes
25 ChaCha20 Encrypt and decrypt 8 bytes
29 ChaCha20 Encrypt and decrypt 9 bytes
33 ChaCha20 Encrypt and decrypt 15 bytes
37 ChaCha20 Encrypt and decrypt 16 bytes
41 ChaCha20 Encrypt and decrypt 17 bytes
45 ChaCha20 Encrypt and decrypt 31 bytes
[all …]
A Dtest_suite_cipher.aes.data377 AES-128 CFB - Encrypt and decrypt 0 bytes
385 AES-128 CFB - Encrypt and decrypt 2 bytes
389 AES-128 CFB - Encrypt and decrypt 7 bytes
393 AES-128 CFB - Encrypt and decrypt 8 bytes
397 AES-128 CFB - Encrypt and decrypt 9 bytes
481 AES-128 OFB - Encrypt and decrypt 0 bytes
489 AES-128 OFB - Encrypt and decrypt 2 bytes
493 AES-128 OFB - Encrypt and decrypt 7 bytes
497 AES-128 OFB - Encrypt and decrypt 8 bytes
501 AES-128 OFB - Encrypt and decrypt 9 bytes
[all …]
A Dtest_suite_cipher.chachapoly.data5 ChaCha20+Poly1305 Encrypt and decrypt 0 bytes
9 ChaCha20+Poly1305 Encrypt and decrypt 1 bytes
13 ChaCha20+Poly1305 Encrypt and decrypt 2 bytes
17 ChaCha20+Poly1305 Encrypt and decrypt 7 bytes
21 ChaCha20+Poly1305 Encrypt and decrypt 8 bytes
25 ChaCha20+Poly1305 Encrypt and decrypt 9 bytes
29 ChaCha20+Poly1305 Encrypt and decrypt 15 bytes
33 ChaCha20+Poly1305 Encrypt and decrypt 16 bytes
37 ChaCha20+Poly1305 Encrypt and decrypt 17 bytes
41 ChaCha20+Poly1305 Encrypt and decrypt 31 bytes
[all …]
A Dtest_suite_bignum_core.function37 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
42 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
47 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
54 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
59 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
65 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
70 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
75 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
114 TEST_MEMORY_COMPARE(X, bytes, A, bytes);
118 TEST_MEMORY_COMPARE(X, bytes, S, bytes);
[all …]
A Dtest_suite_cipher.padding.data68 Check PKCS padding #6 (too few padding bytes)
72 Check PKCS padding #7 (non-uniform padding bytes #1)
76 Check PKCS padding #7 (non-uniform padding bytes #2)
80 Check PKCS padding #7 (non-uniform padding bytes #3)
84 Check PKCS padding #7 (non-uniform padding bytes #4)
88 Check PKCS padding #7 (non-uniform padding bytes #5)
92 Check PKCS padding #7 (non-uniform padding bytes #6)
96 Check PKCS padding #7 (non-uniform padding bytes #7)
100 Check PKCS padding #7 (non-uniform padding bytes #8)
104 Check PKCS padding #7 (non-uniform padding bytes #9)
[all …]
A Dtest_suite_psa_its.data1 Set/get/remove 0 bytes
4 Set/get/remove 42 bytes
7 Set/get/remove 1000 bytes
40 Get 0 bytes of 10 at 10
46 Get 0 bytes of 10 at 0
52 Get 2 bytes of 10 at 1
61 Get 0 bytes of 10 at 11: out of range
A Dtest_suite_bignum_mod.function131 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
134 memcpy(rX.p, rA.p, bytes);
136 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
141 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
146 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
151 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
156 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
161 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
166 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes);
302 memcpy(x.p, a.p, bytes);
[all …]
A Dtest_suite_bignum_core.misc.data428 Fill random core: 0 bytes
449 Fill random core: 8 bytes, RNG stops before
452 Fill random core: 8 bytes, RNG just sufficient
455 Fill random core: 8 bytes, RNG not exhausted
461 Fill random core: 8 bytes, 1 extra limb
467 Fill random core: 9 bytes, 1 missing limb
470 Fill random core: 42 bytes, RNG stops before
476 Fill random core: 42 bytes, RNG not exhausted
482 Fill random core: 42 bytes, 1 extra limb
488 Fill random core: 42 bytes, 1 missing limb
[all …]
A Dtest_suite_asn1parse.data64 length=0 (2 length bytes)
73 length=1 (2 length bytes)
76 length=1 (3 length bytes)
79 length=1 (4 length bytes)
88 length=2 (2 length bytes)
91 length=2 (3 length bytes)
94 length=2 (4 length bytes)
103 length=128 (2 length bytes)
109 length=255 (2 length bytes)
112 length=256 (2 length bytes)
[all …]
A Dtest_suite_psa_crypto_driver_wrappers.data358 PSA symmetric decrypt: AES-CTR, 16 bytes, good
366 PSA symmetric decrypt: AES-CTR, 16 bytes, fake
458 PSA AEAD encrypt: AES-CCM, 24 bytes
462 PSA AEAD encrypt: AES-CCM, 24 bytes, fallback
470 PSA AEAD encrypt, AES-GCM, 128 bytes #1
474 PSA AEAD encrypt, AES-GCM, 128 bytes #1, fallback
482 PSA AEAD decrypt: AES-CCM, 39 bytes
486 PSA AEAD decrypt: AES-CCM, 39 bytes, fallback
494 PSA AEAD decrypt, AES-GCM, 144 bytes #1
800 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1
[all …]
A Dtest_suite_lms.data18 # word at the start of the key/sig. We strip these 4 bytes from the signature
22 # signature bytes will differ due to randomization):
32 # message1 = bytes.fromhex('60da1a17c88c59da8a730e6ca8effd37')
43 # signature bytes will differ due to randomization), after generating the
62 # signature bytes will differ due to randomization):
94 # signature bytes will differ due to randomization):
122 # signature bytes will differ due to randomization):
146 # signature bytes will differ due to randomization):
157 # message = bytes.fromhex('60da1a17c88c59da8a730e6ca8effd37')
169 # signature bytes will differ due to randomization):
[all …]
A Dtest_suite_psa_crypto.data7 PSA import/export raw: 1 bytes
10 PSA import/export raw: 1 bytes, larger buffer
13 PSA import/export raw: 2 bytes, buffer too small
28 PSA import/export raw: 1 bytes, opaque
2810 PSA AEAD encrypt: AES-CCM, 23 bytes
6321 # output key test: secret passed as bytes, other secret passed as bytes
7344 PSA generate random: 0 bytes
7350 PSA generate random: 4 bytes
7353 PSA generate random: 16 bytes
7356 PSA generate random: 19 bytes
[all …]
A Dtest_suite_cipher.gcm.data13 AES 128 GCM Encrypt and decrypt 0 bytes
21 AES 128 GCM Encrypt and decrypt 2 bytes
25 AES 128 GCM Encrypt and decrypt 7 bytes
29 AES 128 GCM Encrypt and decrypt 8 bytes
33 AES 128 GCM Encrypt and decrypt 9 bytes
37 AES 128 GCM Encrypt and decrypt 15 bytes
41 AES 128 GCM Encrypt and decrypt 16 bytes
45 AES 128 GCM Encrypt and decrypt 17 bytes
49 AES 128 GCM Encrypt and decrypt 31 bytes
61 AES 128 GCM Encrypt and decrypt 47 bytes
[all …]
/lib/mbedtls/external/mbedtls/scripts/mbedtls_dev/
A Dpsa_storage.py109 material: bytes #pylint: disable=used-before-assignment argument
127 ) -> bytes: #pylint: disable=used-before-assignment
141 def bytes(self) -> bytes: member in Key
168 return self.bytes().hex()
186 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex))
197 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex))
205 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex))
A Dasymmetric_key_data.py16 def unhexlify(text: str) -> bytes:
19 def construct_asymmetric_key_data(src) -> Dict[str, Dict[int, bytes]]:
/lib/libavb/
A Davb_util.c40 uint8_t bytes[4]; in avb_htobe32() member
42 ret.bytes[0] = (in >> 24) & 0xff; in avb_htobe32()
43 ret.bytes[1] = (in >> 16) & 0xff; in avb_htobe32()
44 ret.bytes[2] = (in >> 8) & 0xff; in avb_htobe32()
45 ret.bytes[3] = in & 0xff; in avb_htobe32()
53 uint8_t bytes[8]; in avb_htobe64() member
55 ret.bytes[0] = (in >> 56) & 0xff; in avb_htobe64()
56 ret.bytes[1] = (in >> 48) & 0xff; in avb_htobe64()
57 ret.bytes[2] = (in >> 40) & 0xff; in avb_htobe64()
61 ret.bytes[6] = (in >> 8) & 0xff; in avb_htobe64()
[all …]
/lib/mbedtls/external/mbedtls/docs/architecture/
A Dmbed-crypto-storage-specification.md55 * magic (8 bytes): `"PSA\0KEY\0"`
56 * version (4 bytes): 0
60 * key material length (4 bytes)
206 * version (4 bytes): 0
211 * key material length (4 bytes)
265 * version (4 bytes): 0.
271 * key material length (4 bytes).
289 * unused (2 bytes)
324 * version (4 bytes): 0.
415 * version (4 bytes): 0.
[all …]
/lib/
A Dstring.c748 static void *check_bytes8(const u8 *start, u8 value, unsigned int bytes) in check_bytes8() argument
750 while (bytes) { in check_bytes8()
754 bytes--; in check_bytes8()
767 void *memchr_inv(const void *start, int c, size_t bytes) in memchr_inv() argument
773 if (bytes <= 16) in memchr_inv()
774 return check_bytes8(start, value, bytes); in memchr_inv()
790 bytes -= prefix; in memchr_inv()
793 words = bytes / 8; in memchr_inv()
802 return check_bytes8(start, value, bytes % 8); in memchr_inv()
A Dtables_csum.c10 const u8 *bytes = v; in table_compute_checksum() local
15 checksum -= bytes[i]; in table_compute_checksum()
/lib/lzma/
A Dlzma.txt191 The maximum value for dictionary size is 1 GB = 2^30 bytes.
192 Dictionary size is calculated as DictionarySize = 2^N bytes.
194 size D = 2^N you need about D bytes of memory (RAM).
196 -fb{N}: set number of fast bytes - [5, 273], default: 128
205 equal 2^N. For example, for 32-bit (4 bytes)
326 larger than 200-400 bytes.
369 propData - LZMA properties (5 bytes)
370 propSize - size of propData buffer (5 bytes)
372 LZMA_FINISH_ANY - Decode just destLen bytes.
391 SZ_ERROR_INPUT_EOF - It needs more bytes in input buffer (src).
[all …]

Completed in 886 milliseconds

12345